Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
39 Cards in this Set
- Front
- Back
Why are weak passwords a significant problem in networks?
|
Because hackers can get in and cause problems
|
|
List three true measures of password quality.
|
Is it guessable? is it easy to remember? is it easy for others to remember?
|
|
What is using a dictionary attack?
|
It is using a long list of likely passwords in hopes of finding one that works.
|
|
List two types of bad passwords
|
anything short, anything in the dictionary
|
|
What do I reccomend for a password
|
initial of a familiar phrase
|
|
What is multi-factor authentication?
|
asking for several unrelated things to prove identity
|
|
How does rot13 work?
|
by replacing each letter by the one 13 letters away
|
|
How do you send a private message to Bob?
|
encrypt it with Bob public key
|
|
What is the purpose of encrypting a message?
|
Prevent others from understanding it
|
|
What is the purpose of signing a message?
|
Authentication
|
|
How do you sign a message?
|
by encrypting it with your private key
|
|
How does signing prove authorship?
|
Signing has a key unique to the author, and what only the author would know.
|
|
How can Bob send a private, authenticated message to Alice?
|
Encrypt it with Bob's private key to prove authorship. Encrypt the result with Alice's public key to provide privacy
|
|
Why are public-key systems special?
|
they allow secure connections to be established between computers that don't know each other
|
|
Why is RSA special?
|
because it can easily create good public keys
|
|
What is a prime number?
|
A number that has no factors
|
|
Why are prime numbers used in encryption?
|
Because it is easy to multiply two large prime numbers but it is difficult to find the original number
|
|
What does the RSA private key consist of?
|
Two large prime numbers
|
|
What does the RSA public key consist of?
|
product of two large prime numbers
|
|
If RSA is so great, why are other things used?
|
speed
|
|
Is http considered to be secure? Why?
|
no because it is not encrypted
|
|
Is https considered to be secure? Why?
|
Yes, the data is encrypted.
|
|
What does SSL stand for?
|
secure socket layer
|
|
What does TLS stand for?
|
transport layer security
|
|
How does SSL protect confidentiality of a TCP connection?
|
because the traffic data encrypted, and it can hide its meaning
|
|
What is an outside threat?
|
A threat by a machine outside of your LAN.
|
|
What is a botnet?
|
a bot-net is a collection of computers that are controlled by a hacker, usually without the owners knowledge
|
|
What are two things that botnets commonly used for?
|
sending spam and doing attacks
|
|
What does DDOS stand for?
|
Distributed Denial of Service
|
|
What is a zombie?
|
A computer on a botnet
|
|
What does PWN stand for?
|
Gain control over a machine.
|
|
What is an Inside Threat?
|
a threat by a machine inside of your LAN
|
|
What two things does the server mean?
|
it is a program that provides service and a computer where such a program runs.
|
|
How can firewalls mitigate network attacks against servers?
|
by only allowing requests based on IP address and port
|
|
How can firewalls mitigate network attacks against clients?
|
by stopping unexpected traffic from entering your LAN
|
|
What does DMZ stand for?
|
Demilitarized Zone
|
|
What service does DMZ provide?
|
it directs all unexpected traffic on all ports to a designated machine
|
|
What service does port forwarding provide?
|
it directs unexpected network traffic from a few ports to a designated machine
|
|
How can sharing your Wi-Fi be dangerous?
|
bad people can directly get into your LAN. this bypasses your main firewall
|